default search action
BibTeX records: Katsunari Yoshioka
@article{DBLP:journals/access/UchiboriYO24, author = {Hironori Uchibori and Katsunari Yoshioka and Kazumasa Omote}, title = {Honeypot Method to Lure Attackers Without Holding Crypto-Assets}, journal = {{IEEE} Access}, volume = {12}, pages = {16059--16071}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3357785}, doi = {10.1109/ACCESS.2024.3357785}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/UchiboriYO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/SasakiKKYM24, author = {Takayuki Sasaki and Mami Kawaguchi and Takuhiro Kumagai and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Observation of Human-Operated Accesses Using Remote Management Device Honeypot}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {3}, pages = {291--305}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023cip0018}, doi = {10.1587/TRANSFUN.2023CIP0018}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/SasakiKKYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NakanoCKFYHYM24, author = {Hiroki Nakano and Daiki Chiba and Takashi Koide and Naoki Fukushi and Takeshi Yagi and Takeo Hariu and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {107}, number = {7}, pages = {807--824}, year = {2024}, url = {https://doi.org/10.1587/transinf.2023edp7221}, doi = {10.1587/TRANSINF.2023EDP7221}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NakanoCKFYHYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YasuiISTYM24, author = {Hiroki Yasui and Takahiro Inoue and Takayuki Sasaki and Rui Tanabe and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {{SPOT:} In-depth Analysis of IoT Ransomware Attacks Using Bare Metal {NAS} Devices}, journal = {J. Inf. Process.}, volume = {32}, pages = {23--34}, year = {2024}, url = {https://doi.org/10.2197/ipsjjip.32.23}, doi = {10.2197/IPSJJIP.32.23}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YasuiISTYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TanabeIIKIYM24, author = {Rui Tanabe and Yuta Inoue and Daigo Ichikawa and Takahiro Kasama and Daisuke Inoue and Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Hossain Shahriar and Hiroyuki Ohsaki and Moushumi Sharmin and Dave Towey and A. K. M. Jahangir Alam Majumder and Yoshiaki Hori and Ji{-}Jiang Yang and Michiharu Takemoto and Nazmus Sakib and Ryohei Banno and Sheikh Iqbal Ahamed}, title = {Customized Malware: Identifying Target Systems Using Personally Identifiable Information}, booktitle = {48th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2024, Osaka, Japan, July 2-4, 2024}, pages = {1007--1012}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/COMPSAC61105.2024.00137}, doi = {10.1109/COMPSAC61105.2024.00137}, timestamp = {Thu, 05 Sep 2024 13:56:33 +0200}, biburl = {https://dblp.org/rec/conf/compsac/TanabeIIKIYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TakaoHTTFIGEYM24, author = {Kyohei Takao and Chika Hiraishi and Rui Tanabe and Kazuki Takada and Akira Fujita and Daisuke Inoue and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {{VT-SOS:} {A} Cost-effective {URL} Warning utilizing VirusTotal as a Second Opinion Service}, booktitle = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul, Republic of Korea, May 6-10, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NOMS59830.2024.10575506}, doi = {10.1109/NOMS59830.2024.10575506}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/TakaoHTTFIGEYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SasakiNMSEYM24, author = {Takayuki Sasaki and Takaya Noma and Yudai Morii and Toshiya Shimura and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, pages = {2291--2309}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SP54263.2024.00117}, doi = {10.1109/SP54263.2024.00117}, timestamp = {Sat, 21 Sep 2024 14:24:56 +0200}, biburl = {https://dblp.org/rec/conf/sp/SasakiNMSEYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23, author = {Koji Nakao and Katsunari Yoshioka and Takayuki Sasaki and Rui Tanabe and Xuping Huang and Takeshi Takahashi and Akira Fujita and Jun'ichi Takeuchi and Noboru Murata and Junji Shikata and Kazuki Iwamoto and Kazuki Takada and Yuki Ishida and Masaru Takeuchi and Naoto Yanai}, title = {Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1302--1315}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022ici0001}, doi = {10.1587/TRANSINF.2022ICI0001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HuangMFY23, author = {Xuping Huang and Shunsuke Mochizuki and Akira Fujita and Katsunari Yoshioka}, title = {Simulating and Estimating the Effectiveness of Security Notification by {ISP} to Malware-Infected Users}, journal = {J. Inf. Process.}, volume = {31}, pages = {165--173}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.165}, doi = {10.2197/IPSJJIP.31.165}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/HuangMFY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Nakano0KFYHYM23, author = {Hiroki Nakano and Daiki Chiba and Takashi Koide and Naoki Fukushi and Takeshi Yagi and Takeo Hariu and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {6:1--6:12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600163}, doi = {10.1145/3600160.3600163}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Nakano0KFYHYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnghelVRSMYGZ23, author = {Radu Anghel and Swaathi Vetrivel and Elsa Turcios Rodriguez and Kaichi Sameshima and Daisuke Makita and Katsunari Yoshioka and Carlos Ga{\~{n}}{\'{a}}n and Yury Zhauniarovich}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Peering into the Darkness: The Use of {UTRS} in Combating DDoS Attacks}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {23--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_2}, doi = {10.1007/978-3-031-51476-0\_2}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnghelVRSMYGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdfs/SasakiYM23, author = {Takayuki Sasaki and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Who are you{\(f\)} OSINT-based Profiling of Infrastructure Honeypot Visitors}, booktitle = {11th International Symposium on Digital Forensics and Security, {ISDFS} 2023, Chattanooga, TN, USA, May 11-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISDFS58141.2023.10131856}, doi = {10.1109/ISDFS58141.2023.10131856}, timestamp = {Sun, 04 Jun 2023 12:05:03 +0200}, biburl = {https://dblp.org/rec/conf/isdfs/SasakiYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AlsadiSYEG23, author = {Arwa Abdulkarim Al Alsadi and Kaichi Sameshima and Katsunari Yoshioka and Michel van Eeten and Carlos Hernandez Ga{\~{n}}{\'{a}}n}, title = {Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {513--526}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607241}, doi = {10.1145/3607199.3607241}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AlsadiSYEG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaTKEYM23, author = {Yin Minn Pa Pa and Shunsuke Tanizaki and Tetsui Kou and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware}, booktitle = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023, Marina del Rey, CA, USA, August 7-8, 2023}, pages = {10--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607505.3607513}, doi = {10.1145/3607505.3607513}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PaTKEYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-15847, author = {Hiroki Nakano and Daiki Chiba and Takashi Koide and Naoki Fukushi and Takeshi Yagi and Takeo Hariu and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts}, journal = {CoRR}, volume = {abs/2303.15847}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.15847}, doi = {10.48550/ARXIV.2303.15847}, eprinttype = {arXiv}, eprint = {2303.15847}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-15847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NakanoCKAYM22, author = {Hiroki Nakano and Daiki Chiba and Takashi Koide and Mitsuaki Akiyama and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild}, journal = {J. Inf. Process.}, volume = {30}, pages = {372--387}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.372}, doi = {10.2197/IPSJJIP.30.372}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/NakanoCKAYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TanabeWFIGEYM22, author = {Rui Tanabe and Tsuyufumi Watanabe and Akira Fujita and Ryoichi Isawa and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure}, journal = {J. Inf. Process.}, volume = {30}, pages = {577--590}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.577}, doi = {10.2197/IPSJJIP.30.577}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/TanabeWFIGEYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HuangMY22, author = {Xuping Huang and Shunsuke Mochizuki and Katsunari Yoshioka}, title = {Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts}, journal = {J. Inf. Process.}, volume = {30}, pages = {859--864}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.859}, doi = {10.2197/IPSJJIP.30.859}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/HuangMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/UedaSYM22, author = {Takahiro Ueda and Takayuki Sasaki and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {146:1--146:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543802}, doi = {10.1145/3538969.3543802}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/UedaSYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AlsadiSBYLEG22, author = {Arwa Abdulkarim Al Alsadi and Kaichi Sameshima and Jakob Bleier and Katsunari Yoshioka and Martina Lindorfer and Michel van Eeten and Carlos Hernandez Ga{\~{n}}{\'{a}}n}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {309--321}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517408}, doi = {10.1145/3488932.3517408}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AlsadiSBYLEG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YasuiISTYM22, author = {Hiroki Yasui and Takahiro Inoue and Takayuki Sasaki and Rui Tanabe and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {{SPOT:} Analyzing IoT Ransomware Attacks using Bare Metal {NAS} Devices}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {16--23}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00013}, doi = {10.1109/ASIAJCIS57030.2022.00013}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YasuiISTYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/Yoshioka22, author = {Katsunari Yoshioka}, editor = {Alvaro A. C{\'{a}}rdenas and Daisuke Mashima and Ertem Esiner}, title = {Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification}, booktitle = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {39--40}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494107.3522781}, doi = {10.1145/3494107.3522781}, timestamp = {Mon, 04 Jul 2022 17:06:15 +0200}, biburl = {https://dblp.org/rec/conf/cpss/Yoshioka22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KondoTSMYM22, author = {Mizuki Kondo and Rui Tanabe and Natsuo Shintani and Daisuke Makita and Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Lorenzo Cavallaro and Daniel Gruss and Giancarlo Pellegrino and Giorgio Giacinto}, title = {Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13358}, pages = {178--196}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09484-2\_10}, doi = {10.1007/978-3-031-09484-2\_10}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KondoTSMYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangSOYM22, author = {Jia Wang and Takayuki Sasaki and Kazumasa Omote and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {71--79}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00022}, doi = {10.1109/CSP55486.2022.00022}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/WangSOYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SasakiFGEYM22, author = {Takayuki Sasaki and Akira Fujita and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure {ICS} Remote Management Devices}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2379--2396}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833730}, doi = {10.1109/SP46214.2022.9833730}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/SasakiFGEYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunBHTYTSQI21, author = {Bo Sun and Tao Ban and Chansu Han and Takeshi Takahashi and Katsunari Yoshioka and Jun'ichi Takeuchi and Abdolhossein Sarrafzadeh and Meikang Qiu and Daisuke Inoue}, title = {Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks}, journal = {{IEEE} Access}, volume = {9}, pages = {87962--87971}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3082000}, doi = {10.1109/ACCESS.2021.3082000}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunBHTYTSQI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/KoideCAYM21, author = {Takashi Koide and Daiki Chiba and Mitsuaki Akiyama and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {162--181}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0005}, doi = {10.1587/TRANSFUN.2020CIP0005}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/KoideCAYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KoideCAYM21, author = {Takashi Koide and Daiki Chiba and Mitsuaki Akiyama and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Understanding the Fake Removal Information Advertisement Sites}, journal = {J. Inf. Process.}, volume = {29}, pages = {392--405}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.392}, doi = {10.2197/IPSJJIP.29.392}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KoideCAYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Yoshioka21, author = {Katsunari Yoshioka}, title = {Editor's Message to Special Issue of Computer Security Technologies for Realizing Society 5.0}, journal = {J. Inf. Process.}, volume = {29}, pages = {504}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.504}, doi = {10.2197/IPSJJIP.29.504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/Yoshioka21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/BokhariIKYM21, author = {Aamir H. Bokhari and Yuta Inoue and Seiya Kato and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device}, journal = {J. Inf. Process.}, volume = {29}, pages = {572--580}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.572}, doi = {10.2197/IPSJJIP.29.572}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/BokhariIKYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/KatoTYM21, author = {Seiya Kato and Rui Tanabe and Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Toufik Ahmed and Olivier Festor and Yacine Ghamri{-}Doudane and Joon{-}Myung Kang and Alberto E. Schaeffer Filho and Abdelkader Lahmadi and Edmundo R. M. Madeira}, title = {Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices}, booktitle = {17th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2021, Bordeaux, France, May 17-21, 2021}, pages = {143--151}, publisher = {{IEEE}}, year = {2021}, url = {https://ieeexplore.ieee.org/document/9464004}, timestamp = {Mon, 05 Jul 2021 08:04:03 +0200}, biburl = {https://dblp.org/rec/conf/im/KatoTYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TakahashiUHBFNY21, author = {Takeshi Takahashi and Yuki Umemura and Chansu Han and Tao Ban and Keisuke Furumoto and Ohnori Nakamura and Katsunari Yoshioka and Jun'ichi Takeuchi and Noboru Murata and Yoshiaki Shiraishi}, title = {Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?}, booktitle = {19th {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel, Germany, March 22-26, 2021}, pages = {376--379}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431125}, doi = {10.1109/PERCOMWORKSHOPS51409.2021.9431125}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/TakahashiUHBFNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WuHYM20, author = {Chun{-}Jung Wu and Shin{-}Ying Huang and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information}, journal = {{IEICE} Trans. Commun.}, volume = {103-B}, number = {1}, pages = {32--42}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-b\_1\_32}, doi = {10.1587/TRANSCOM.2019CPP0009}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WuHYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/SasakiGYEM20, author = {Takayuki Sasaki and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Katsunari Yoshioka and Michel van Eeten and Tsutomu Matsumoto}, title = {Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers}, journal = {{IEICE} Trans. Commun.}, volume = {103-B}, number = {4}, pages = {389--404}, year = {2020}, url = {https://doi.org/10.1587/transcom.2019NRP0001}, doi = {10.1587/TRANSCOM.2019NRP0001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/SasakiGYEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/KaneiCHYMA20, author = {Fumihiro Kanei and Daiki Chiba and Kunio Hato and Katsunari Yoshioka and Tsutomu Matsumoto and Mitsuaki Akiyama}, title = {Detecting and Understanding Online Advertising Fraud in the Wild}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {7}, pages = {1512--1523}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019ICP0008}, doi = {10.1587/TRANSINF.2019ICP0008}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/KaneiCHYMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/WuYM20, author = {Chun{-}Jung Wu and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {ThingGate: {A} Gateway for Managing Traffic of Bare-metal IoT Honeypot}, journal = {J. Inf. Process.}, volume = {28}, pages = {481--492}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.481}, doi = {10.2197/IPSJJIP.28.481}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/WuYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TamiyaBENTTFYM20, author = {Kazuki Tamiya and Aamir H. Bokhari and Yuta Ezawa and Sou Nakayama and Ying Tie and Rui Tanabe and Akira Fujita and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Dangers of {IP} Camera - An Observational Study on Peeping}, journal = {J. Inf. Process.}, volume = {28}, pages = {502--510}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.502}, doi = {10.2197/IPSJJIP.28.502}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TamiyaBENTTFYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TanabeTFIYMGE20, author = {Rui Tanabe and Tatsuya Tamai and Akira Fujita and Ryoichi Isawa and Katsunari Yoshioka and Tsutomu Matsumoto and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Disposable botnets: examining the anatomy of IoT botnet infrastructure}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409177}, doi = {10.1145/3407023.3409177}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TanabeTFIYMGE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Koide0AYM20, author = {Takashi Koide and Daiki Chiba and Mitsuaki Akiyama and Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {171--191}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_9}, doi = {10.1007/978-3-030-52683-2\_9}, timestamp = {Sun, 25 Jul 2021 11:49:24 +0200}, biburl = {https://dblp.org/rec/conf/dimva/Koide0AYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WanIAYHRD20, author = {Gerry Wan and Liz Izhikevich and David Adrian and Katsunari Yoshioka and Ralph Holz and Christian Rossow and Zakir Durumeric}, title = {On the Origin of Scanning: The Impact of Location on Internet-Wide Scans}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {662--679}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3424214}, doi = {10.1145/3419394.3424214}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/WanIAYHRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TakahashiKVYI20, author = {Takeshi Takahashi and Christopher Kruegel and Giovanni Vigna and Katsunari Yoshioka and Daisuke Inoue}, editor = {Manuel Egele and Leyla Bilge}, title = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/takahashi}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TakahashiSTY20, author = {Yusuke Takahashi and Shigeyoshi Shima and Rui Tanabe and Katsunari Yoshioka}, editor = {Tamara Denning and Tyler Moore}, title = {APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences}, booktitle = {13th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2020, August 10, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/cset20/presentation/takahashi}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/TakahashiSTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/BanIHYI19, author = {Tao Ban and Ryoichi Isawa and Shin{-}Ying Huang and Katsunari Yoshioka and Daisuke Inoue}, title = {A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {9}, pages = {1683--1685}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018OFL0007}, doi = {10.1587/TRANSINF.2018OFL0007}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/BanIHYI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/MorishitaHUTGEY19, author = {Shun Morishita and Takuya Hoizumi and Wataru Ueno and Rui Tanabe and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten and Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {134--143}, publisher = {{IFIP}}, year = {2019}, url = {http://dl.ifip.org/db/conf/im/im2019/188804.pdf}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/MorishitaHUTGEY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CetinGAKITTYE19, author = {Or{\c{c}}un {\c{C}}etin and Carlos Ga{\~{n}}{\'{a}}n and Lisette Altena and Takahiro Kasama and Daisuke Inoue and Kazuki Tamiya and Ying Tie and Katsunari Yoshioka and Michel van Eeten}, title = {Cleaning Up the Internet of Evil Things: Real-World Evidence on {ISP} and Consumer Efforts to Remove Mirai}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/cleaning-up-the-internet-of-evil-things-real-world-evidence-on-isp-and-consumer-efforts-to-remove-mirai/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CetinGAKITTYE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoKTAY18, author = {Hiroki Nakano and Fumihiro Kanei and Yuta Takata and Mitsuaki Akiyama and Katsunari Yoshioka}, title = {Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {11}, pages = {2576--2583}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017ICP0009}, doi = {10.1587/TRANSINF.2017ICP0009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoKTAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/WuTHTFYM18, author = {Chun{-}Jung Wu and Ying Tie and Satoshi Hara and Kazuki Tamiya and Akira Fujita and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices}, journal = {J. Inf. Process.}, volume = {26}, pages = {662--672}, year = {2018}, url = {https://doi.org/10.2197/ipsjjip.26.662}, doi = {10.2197/IPSJJIP.26.662}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/WuTHTFYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SasakiYM18, author = {Takayuki Sasaki and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Toward Collaborative Defense Across Organizations}, journal = {J. Inf. Process.}, volume = {26}, pages = {790--803}, year = {2018}, url = {https://doi.org/10.2197/ipsjjip.26.790}, doi = {10.2197/IPSJJIP.26.790}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/SasakiYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18, author = {Ryoichi Isawa and Tao Ban and Ying Tie and Katsunari Yoshioka and Daisuke Inoue}, title = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00023}, doi = {10.1109/ASIAJCIS.2018.00023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TanabeUIYMKIR18, author = {Rui Tanabe and Wataru Ueno and Kou Ishii and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Daisuke Inoue and Christian Rossow}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {Evasive Malware via Identifier Implanting}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {162--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_8}, doi = {10.1007/978-3-319-93411-2\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TanabeUIYMKIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmu/BanIYI18, author = {Tao Ban and Ryoichi Isawa and Katsunari Yoshioka and Daisuke Inoue}, title = {A Cross-Platform Study on IoT Malware}, booktitle = {Eleventh International Conference on Mobile Computing and Ubiquitous Network, {ICMU} 2018, Auckland, New Zealand, October 5-8, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICMU.2018.8653580}, doi = {10.23919/ICMU.2018.8653580}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icmu/BanIYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/MazurczykKNKHY17, author = {Wojciech Mazurczyk and Maciej Korczynski and Koji Nakao and Engin Kirda and Cristian Hesselman and Katsunari Yoshioka}, title = {Traffic Measurements for Cyber Security}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.7981517}, doi = {10.1109/MCOM.2017.7981517}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/MazurczykKNKHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/PaSYMKR16, author = {Yin Minn Pa Pa and Shogo Suzuki and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Christian Rossow}, title = {IoTPOT: {A} Novel Honeypot for Revealing Current IoT Threats}, journal = {J. Inf. Process.}, volume = {24}, number = {3}, pages = {522--533}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.522}, doi = {10.2197/IPSJJIP.24.522}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/PaSYMKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SaitoTYM16, author = {Satomi Saito and Satoru Torii and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {60--66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.32}, doi = {10.1109/ASIAJCIS.2016.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SaitoTYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16, author = {Akira Yokoyama and Kou Ishii and Rui Tanabe and Yinmin Papa and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Daisuke Inoue and Michael Brengel and Michael Backes and Christian Rossow}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {165--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_8}, doi = {10.1007/978-3-319-45719-2\_8}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NoroozianKGMYE16, author = {Arman Noroozian and Maciej Korczynski and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Daisuke Makita and Katsunari Yoshioka and Michel van Eeten}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {368--389}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_17}, doi = {10.1007/978-3-319-45719-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NoroozianKGMYE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KikuchiMNYME16, author = {Yosuke Kikuchi and Hiroshi Mori and Hiroki Nakano and Katsunari Yoshioka and Tsutomu Matsumoto and Michel van Eeten}, editor = {Eric Eide and Mathias Payer}, title = {Evaluating Malware Mitigation by Android Market Operators}, booktitle = {9th Workshop on Cyber Security Experimentation and Test, {CSET} '16, Austin, TX, USA, August 8, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/cset16/workshop-program/presentation/kikuchi}, timestamp = {Mon, 01 Feb 2021 08:43:05 +0100}, biburl = {https://dblp.org/rec/conf/uss/KikuchiMNYME16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2016, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3}, doi = {10.1007/978-3-319-44524-3}, isbn = {978-3-319-44523-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/PaYM15, author = {Yin Minn Pa Pa and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to {IP} Addresses}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {623--632}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.623}, doi = {10.2197/IPSJJIP.23.623}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/PaYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SuYSM15, author = {Jiawei Su and Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, editor = {Soonhak Kwon and Aaram Yun}, title = {Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {278--293}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_18}, doi = {10.1007/978-3-319-30840-1\_18}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SuYSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KramerKMNKYR15, author = {Lukas Kr{\"{a}}mer and Johannes Krupp and Daisuke Makita and Tomomi Nishizoe and Takashi Koide and Katsunari Yoshioka and Christian Rossow}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {615--636}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_28}, doi = {10.1007/978-3-319-26362-5\_28}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/PaSYMKR15, author = {Yin Minn Pa Pa and Shogo Suzuki and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Christian Rossow}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {IoTPOT: Analysing the Rise of IoT Compromises}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/pa}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/PaSYMKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KasamaYIM13, author = {Takahiro Kasama and Katsunari Yoshioka and Daisuke Inoue and Tsutomu Matsumoto}, title = {Catching the Behavioral Differences between Multiple Executions for Malware Detection}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {225--232}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.225}, doi = {10.1587/TRANSFUN.E96.A.225}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KasamaYIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/PaYM13, author = {Yin Minn Pa Pa and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Search Engine Based Investigation on Misconfiguration of Zone Transfer}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {56--62}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.16}, doi = {10.1109/ASIAJCIS.2013.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/PaYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imt/KasamaYMYEIN12, author = {Takahiro Kasama and Katsunari Yoshioka and Tsutomu Matsumoto and Masaya Yamagata and Masashi Eto and Daisuke Inoue and Koji Nakao}, title = {Malware Sandbox Analysis with Efficient Observation of Herder's Behavior}, journal = {Inf. Media Technol.}, volume = {7}, number = {4}, pages = {1577--1587}, year = {2012}, url = {https://doi.org/10.11185/imt.7.1577}, doi = {10.11185/IMT.7.1577}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/KasamaYMYEIN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KasamaYMYEIN12, author = {Takahiro Kasama and Katsunari Yoshioka and Tsutomu Matsumoto and Masaya Yamagata and Masashi Eto and Daisuke Inoue and Koji Nakao}, title = {Malware Sandbox Analysis with Efficient Observation of Herder's Behavior}, journal = {J. Inf. Process.}, volume = {20}, number = {4}, pages = {835--845}, year = {2012}, url = {https://doi.org/10.2197/ipsjjip.20.835}, doi = {10.2197/IPSJJIP.20.835}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KasamaYMYEIN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/KasamaYIM12, author = {Takahiro Kasama and Katsunari Yoshioka and Daisuke Inoue and Tsutomu Matsumoto}, title = {Malware Detection Method by Catching Their Random Behavior in Multiple Executions}, booktitle = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet, {SAINT} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {262--266}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SAINT.2012.49}, doi = {10.1109/SAINT.2012.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/KasamaYIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/FujiiYSM12, author = {Takayoshi Fujii and Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, title = {An Efficient Dynamic Detection Method for Various x86 Shellcodes}, booktitle = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet, {SAINT} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {284--289}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SAINT.2012.52}, doi = {10.1109/SAINT.2012.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/FujiiYSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MatsumotoHTYO12, author = {Tsutomu Matsumoto and Masato Hata and Masato Tanabe and Katsunari Yoshioka and Kazuomi Oishi}, title = {A Method of Preventing Unauthorized Data Transmission in Controller Area Network}, booktitle = {Proceedings of the 75th {IEEE} Vehicular Technology Conference, {VTC} Spring 2012, Yokohama, Japan, May 6-9, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/VETECS.2012.6240294}, doi = {10.1109/VETECS.2012.6240294}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/MatsumotoHTYO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimOYISESMN11, author = {Hyung Chan Kim and Tatsunori Orii and Katsunari Yoshioka and Daisuke Inoue and Jungsuk Song and Masashi Eto and Junji Shikata and Tsutomu Matsumoto and Koji Nakao}, title = {An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {9}, pages = {1778--1791}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.1778}, doi = {10.1587/TRANSINF.E94.D.1778}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimOYISESMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imt/YoshiokaHOM11, author = {Katsunari Yoshioka and Yoshihiko Hosobuchi and Tatsunori Orii and Tsutomu Matsumoto}, title = {Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems}, journal = {Inf. Media Technol.}, volume = {6}, number = {2}, pages = {633--648}, year = {2011}, url = {https://doi.org/10.11185/imt.6.633}, doi = {10.11185/IMT.6.633}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/YoshiokaHOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YoshiokaHOM11, author = {Katsunari Yoshioka and Yoshihiko Hosobuchi and Tatsunori Orii and Tsutomu Matsumoto}, title = {Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems}, journal = {J. Inf. Process.}, volume = {19}, pages = {153--168}, year = {2011}, url = {https://doi.org/10.2197/ipsjjip.19.153}, doi = {10.2197/IPSJJIP.19.153}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YoshiokaHOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshiokaM10, author = {Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {210--218}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.210}, doi = {10.1587/TRANSFUN.E93.A.210}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshiokaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/EtoSIYN10, author = {Masashi Eto and Kotaro Sonoda and Daisuke Inoue and Katsunari Yoshioka and Koji Nakao}, title = {Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1106--1116}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1106}, doi = {10.1587/TRANSINF.E93.D.1106}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/EtoSIYN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/YoshiokaHOM10, author = {Katsunari Yoshioka and Yoshihiko Hosobuchi and Tatsunori Orii and Tsutomu Matsumoto}, title = {Vulnerability in Public Malware Sandbox Analysis Systems}, booktitle = {Tenth Annual International Symposium on Applications and the Internet, {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings}, pages = {265--268}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SAINT.2010.16}, doi = {10.1109/SAINT.2010.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/YoshiokaHOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakaoIEY09, author = {Koji Nakao and Daisuke Inoue and Masashi Eto and Katsunari Yoshioka}, title = {Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {5}, pages = {787--798}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.787}, doi = {10.1587/TRANSINF.E92.D.787}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakaoIEY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/InoueYEHN09, author = {Daisuke Inoue and Katsunari Yoshioka and Masashi Eto and Yuji Hoshizawa and Koji Nakao}, title = {Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {5}, pages = {945--954}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.945}, doi = {10.1587/TRANSINF.E92.D.945}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/InoueYEHN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshiokaIEHNN09, author = {Katsunari Yoshioka and Daisuke Inoue and Masashi Eto and Yuji Hoshizawa and Hiroki Nogawa and Koji Nakao}, title = {Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {5}, pages = {955--966}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.955}, doi = {10.1587/TRANSINF.E92.D.955}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshiokaIEHNN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/EtoSIYN09, author = {Masashi Eto and Kotaro Sonoda and Daisuke Inoue and Katsunari Yoshioka and Koji Nakao}, editor = {Chi{-}Sing Leung and Minho Lee and Jonathan Hoyin Chan}, title = {A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis}, booktitle = {Neural Information Processing, 16th International Conference, {ICONIP} 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5864}, pages = {565--572}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10684-2\_63}, doi = {10.1007/978-3-642-10684-2\_63}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/iconip/EtoSIYN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/InoueSEYN09, author = {Daisuke Inoue and Mio Suzuki and Masashi Eto and Katsunari Yoshioka and Koji Nakao}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {{DAEDALUS:} Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {381--382}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_33}, doi = {10.1007/978-3-642-04342-0\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/InoueSEYN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdim/YoshiokaSTM08, author = {Katsunari Yoshioka and Kotaro Sonoda and Osamu Takizawa and Tsutomu Matsumoto}, title = {Information Hiding on Lossless Data Compression}, journal = {J. Digit. Inf. Manag.}, volume = {6}, number = {2}, pages = {151--160}, year = {2008}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdim/YoshiokaSTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/InoueYEHN08, author = {Daisuke Inoue and Katsunari Yoshioka and Masashi Eto and Yuji Hoshizawa and Koji Nakao}, title = {Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {1715--1721}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.330}, doi = {10.1109/ICC.2008.330}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/InoueYEHN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/InoueYEYNTON09, author = {Daisuke Inoue and Katsunari Yoshioka and Masashi Eto and Masaya Yamagata and Eisuke Nishino and Jun'ichi Takeuchi and Kazuya Ohkouchi and Koji Nakao}, editor = {Mario K{\"{o}}ppen and Nikola K. Kasabov and George G. Coghill}, title = {An Incident Analysis System {NICTER} and Its Analysis Engines Based on Data Mining Techniques}, booktitle = {Advances in Neuro-Information Processing, 15th International Conference, {ICONIP} 2008, Auckland, New Zealand, November 25-28, 2008, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5506}, pages = {579--586}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-02490-0\_71}, doi = {10.1007/978-3-642-02490-0\_71}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/InoueYEYNTON09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YoshiokaM08, author = {Katsunari Yoshioka and Tsutomu Matsumoto}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Fingerprinting Traffic Log}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {143--146}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.276}, doi = {10.1109/IIH-MSP.2008.276}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/YoshiokaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/SonodaYT07, author = {Kotaro Sonoda and Katsunari Yoshioka and Osamu Takizawa}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Information Hiding for Public Address Audio Signal using {FH/FSK} Spread-spectrum Scheme}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {279--282}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIHMSP.2007.4457705}, doi = {10.1109/IIHMSP.2007.4457705}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/SonodaYT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YoshiokaSTM06, author = {Katsunari Yoshioka and Kotaro Sonoda and Osamu Takizawa and Tsutomu Matsumoto}, title = {Information Hiding on Lossless Data Compression}, booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}, pages = {15--18}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IIH-MSP.2006.265109}, doi = {10.1109/IIH-MSP.2006.265109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/YoshiokaSTM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshiokaSM05, author = {Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, title = {On Collusion Security of Random Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {296--304}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_296\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshiokaSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/YoshiokaM03, author = {Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Random-Error Resilience of a Short Collusion-Secure Code}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {5}, pages = {1147--1155}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1147}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/YoshiokaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YoshiokaSM03, author = {Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, editor = {Colin Boyd and Wenbo Mao}, title = {Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {408--421}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_31}, doi = {10.1007/10958513\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/YoshiokaSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.